[pve-devel] [PATCH kernel-4.15 2/4] rebase patches on top of Ubuntu-4.15.0-32.35

Stoiko Ivanov s.ivanov at proxmox.com
Thu Aug 16 12:20:46 CEST 2018


(generated with debian/scripts/import-upstream-tag)

Signed-off-by: Stoiko Ivanov <s.ivanov at proxmox.com>
---
 ...-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch |  4 ++--
 .../0009-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch     | 10 +++++-----
 ...-UBUNTU-SAUCE-apparmor-fix-apparmor-mediating-locking.patch |  5 +----
 ...011-Fix-up-non-directory-creation-in-SGID-directories.patch |  1 -
 4 files changed, 8 insertions(+), 12 deletions(-)

diff --git a/patches/kernel/0003-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch b/patches/kernel/0003-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch
index 483ac38..088e143 100644
--- a/patches/kernel/0003-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch
+++ b/patches/kernel/0003-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch
@@ -54,10 +54,10 @@ Signed-off-by: Fabian Grünbichler <f.gruenbichler at proxmox.com>
  2 files changed, 110 insertions(+)
 
 diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
-index c14cccce6272..b3aa6fcfe035 100644
+index e1c10a202abe..e40248310433 100644
 --- a/Documentation/admin-guide/kernel-parameters.txt
 +++ b/Documentation/admin-guide/kernel-parameters.txt
-@@ -2971,6 +2971,15 @@
+@@ -3049,6 +3049,15 @@
  		nomsi		[MSI] If the PCI_MSI kernel config parameter is
  				enabled, this kernel boot option can be used to
  				disable the use of MSI interrupts system-wide.
diff --git a/patches/kernel/0009-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch b/patches/kernel/0009-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch
index cc72250..eb49834 100644
--- a/patches/kernel/0009-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch
+++ b/patches/kernel/0009-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch
@@ -17,10 +17,10 @@ Signed-off-by: Thomas Lamprecht <t.lamprecht at proxmox.com>
  1 file changed, 13 insertions(+), 2 deletions(-)
 
 diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
-index ddfb9914e105..d81ee9ed4e83 100644
+index 1a5617fc8b6a..5c8bd2d61080 100644
 --- a/arch/x86/kvm/vmx.c
 +++ b/arch/x86/kvm/vmx.c
-@@ -7402,6 +7402,12 @@ static int handle_vmon(struct kvm_vcpu *vcpu)
+@@ -7575,6 +7575,12 @@ static int handle_vmon(struct kvm_vcpu *vcpu)
  		return 1;
  	}
  
@@ -33,7 +33,7 @@ index ddfb9914e105..d81ee9ed4e83 100644
  	if (vmx->nested.vmxon) {
  		nested_vmx_failValid(vcpu, VMXERR_VMXON_IN_VMX_ROOT_OPERATION);
  		return kvm_skip_emulated_instruction(vcpu);
-@@ -7461,6 +7467,11 @@ static int handle_vmon(struct kvm_vcpu *vcpu)
+@@ -7634,6 +7640,11 @@ static int handle_vmon(struct kvm_vcpu *vcpu)
   */
  static int nested_vmx_check_permission(struct kvm_vcpu *vcpu)
  {
@@ -45,7 +45,7 @@ index ddfb9914e105..d81ee9ed4e83 100644
  	if (!to_vmx(vcpu)->nested.vmxon) {
  		kvm_queue_exception(vcpu, UD_VECTOR);
  		return 0;
-@@ -7794,7 +7805,7 @@ static int handle_vmread(struct kvm_vcpu *vcpu)
+@@ -7967,7 +7978,7 @@ static int handle_vmread(struct kvm_vcpu *vcpu)
  		if (get_vmx_mem_address(vcpu, exit_qualification,
  				vmx_instruction_info, true, &gva))
  			return 1;
@@ -54,7 +54,7 @@ index ddfb9914e105..d81ee9ed4e83 100644
  		kvm_write_guest_virt_system(&vcpu->arch.emulate_ctxt, gva,
  			     &field_value, (is_long_mode(vcpu) ? 8 : 4), NULL);
  	}
-@@ -7937,7 +7948,7 @@ static int handle_vmptrst(struct kvm_vcpu *vcpu)
+@@ -8110,7 +8121,7 @@ static int handle_vmptrst(struct kvm_vcpu *vcpu)
  	if (get_vmx_mem_address(vcpu, exit_qualification,
  			vmx_instruction_info, true, &vmcs_gva))
  		return 1;
diff --git a/patches/kernel/0010-UBUNTU-SAUCE-apparmor-fix-apparmor-mediating-locking.patch b/patches/kernel/0010-UBUNTU-SAUCE-apparmor-fix-apparmor-mediating-locking.patch
index 23c1c50..dc8c5ea 100644
--- a/patches/kernel/0010-UBUNTU-SAUCE-apparmor-fix-apparmor-mediating-locking.patch
+++ b/patches/kernel/0010-UBUNTU-SAUCE-apparmor-fix-apparmor-mediating-locking.patch
@@ -19,7 +19,7 @@ Signed-off-by: John Johansen <john.johansen at canonical.com>
  1 file changed, 1 insertion(+), 1 deletion(-)
 
 diff --git a/security/apparmor/lib.c b/security/apparmor/lib.c
-index a7b3f681b80e..eafad30a78d7 100644
+index 068a9f471f77..23f3d16d6b85 100644
 --- a/security/apparmor/lib.c
 +++ b/security/apparmor/lib.c
 @@ -327,7 +327,7 @@ void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
@@ -31,6 +31,3 @@ index a7b3f681b80e..eafad30a78d7 100644
  	perms->audit |= map_other(dfa_other_audit(dfa, state));
  	perms->quiet |= map_other(dfa_other_quiet(dfa, state));
  //	perms->xindex = dfa_user_xindex(dfa, state);
--- 
-2.17.1
-
diff --git a/patches/kernel/0011-Fix-up-non-directory-creation-in-SGID-directories.patch b/patches/kernel/0011-Fix-up-non-directory-creation-in-SGID-directories.patch
index 22d15cb..2fc71a9 100644
--- a/patches/kernel/0011-Fix-up-non-directory-creation-in-SGID-directories.patch
+++ b/patches/kernel/0011-Fix-up-non-directory-creation-in-SGID-directories.patch
@@ -20,7 +20,6 @@ Cc: Al Viro <viro at zeniv.linux.org.uk>
 Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
 (cherry picked from commit  0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7)
 Signed-off-by: Stoiko Ivanov <s.ivanov at proxmox.com>
-
 ---
  fs/inode.c | 6 ++++++
  1 file changed, 6 insertions(+)
-- 
2.11.0





More information about the pve-devel mailing list